General
-
Target
0a4fdcaa0f4966b387fbfb9b8248fd7d.bin
-
Size
229KB
-
Sample
240726-bcrg1swejr
-
MD5
28352a2fa93b3d3c35ef71a4bc16d4b1
-
SHA1
046e3efb3f91a652863b81bedda5651d7331cc16
-
SHA256
6597951b7e4e0a1c81c64472810db4fee2bbd80c7f82ede4aa6a2eaae3d6c7e5
-
SHA512
736bef967867f71a7a18883b0afb0485517bb2df755973a91631e250e78eb1eccd07f0a3381b852c0709f1bb35dd1cedf612cf6c78978bb2da00104a8b96845f
-
SSDEEP
6144:0hdLmXxq/IY7MqRj3YXGekm6wYocLlwClY5ur45yr7MO402Gpt:0hZqxU7MqRj3YJNdcLlwCl8uk4f9h
Static task
static1
Behavioral task
behavioral1
Sample
8139a1abf1b69e34499158be4dd7e73335c67b275b531061d8f3ce1acb8b13ea.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8139a1abf1b69e34499158be4dd7e73335c67b275b531061d8f3ce1acb8b13ea.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___MQHL_.txt
cerber
http://p27dokhpz2n7nvgr.onion/C1E3-7D8C-3285-0446-9A94
http://p27dokhpz2n7nvgr.12hygy.top/C1E3-7D8C-3285-0446-9A94
http://p27dokhpz2n7nvgr.14ewqv.top/C1E3-7D8C-3285-0446-9A94
http://p27dokhpz2n7nvgr.14vvrc.top/C1E3-7D8C-3285-0446-9A94
http://p27dokhpz2n7nvgr.129p1t.top/C1E3-7D8C-3285-0446-9A94
http://p27dokhpz2n7nvgr.1apgrn.top/C1E3-7D8C-3285-0446-9A94
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___LXHFWSEM_.txt
cerber
http://p27dokhpz2n7nvgr.onion/6142-1153-72B5-0446-9583
http://p27dokhpz2n7nvgr.12hygy.top/6142-1153-72B5-0446-9583
http://p27dokhpz2n7nvgr.14ewqv.top/6142-1153-72B5-0446-9583
http://p27dokhpz2n7nvgr.14vvrc.top/6142-1153-72B5-0446-9583
http://p27dokhpz2n7nvgr.129p1t.top/6142-1153-72B5-0446-9583
http://p27dokhpz2n7nvgr.1apgrn.top/6142-1153-72B5-0446-9583
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___RZGJL36_.hta
cerber
Targets
-
-
Target
8139a1abf1b69e34499158be4dd7e73335c67b275b531061d8f3ce1acb8b13ea.exe
-
Size
621KB
-
MD5
0a4fdcaa0f4966b387fbfb9b8248fd7d
-
SHA1
56239da8077f97b837222d855273095779b638cd
-
SHA256
8139a1abf1b69e34499158be4dd7e73335c67b275b531061d8f3ce1acb8b13ea
-
SHA512
aa57096f7b060ff3afdc9347e8a4242e4daa837f96ac18788c8cc0751f7582fb2815b3a3b40af3ee0a8904a300148e848e531e069d367544ddba19ef40173941
-
SSDEEP
6144:HYghlI5/u8f1mr+4RJ99MpDa52RX5wRDhOOU0qsRZ:HYKlYmDXEpDHRXP01
-
Blocklisted process makes network request
-
Contacts a large (1097) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2